CVE-2020-29001

An issue was discovered on Geeni GNC-CW028 Camera 2.7.2, Geeni GNC-CW025 Doorbell 2.9.5, Merkury MI-CW024 Doorbell 2.9.6, and Merkury MI-CW017 Camera 2.9.6 devices. A vulnerability exists in the RESTful Services API that allows a remote attacker to take full control of the camera with a high-privileged account. The vulnerability exists because a static username and password are compiled into the ppsapp RESTful application.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:merkuryinnovations:geeni_gnc-cw028_firmware:2.7.2:*:*:*:*:*:*:*
cpe:2.3:h:merkuryinnovations:geeni_gnc-cw028:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:merkuryinnovations:geeni_gnc-cw025_firmware:2.9.5:*:*:*:*:*:*:*
cpe:2.3:h:merkuryinnovations:geeni_gnc-cw025:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:merkuryinnovations:merkury_mi-cw024_firmware:2.9.6:*:*:*:*:*:*:*
cpe:2.3:h:merkuryinnovations:merkury_mi-cw024:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:merkuryinnovations:merkury_mi-cw017_firmware:2.9.6:*:*:*:*:*:*:*
cpe:2.3:h:merkuryinnovations:merkury_mi-cw017:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:23

Type Values Removed Values Added
References () https://gist.github.com/tj-oconnor/371d34342c0cc2be015cc89d6dc2bc66 - Exploit, Third Party Advisory () https://gist.github.com/tj-oconnor/371d34342c0cc2be015cc89d6dc2bc66 - Exploit, Third Party Advisory
References () https://support.mygeeni.com/hc/en-us - Vendor Advisory () https://support.mygeeni.com/hc/en-us - Vendor Advisory

Information

Published : 2021-01-26 18:15

Updated : 2024-11-21 05:23


NVD link : CVE-2020-29001

Mitre link : CVE-2020-29001

CVE.ORG link : CVE-2020-29001


JSON object : View

Products Affected

merkuryinnovations

  • merkury_mi-cw017_firmware
  • geeni_gnc-cw028
  • merkury_mi-cw017
  • geeni_gnc-cw028_firmware
  • geeni_gnc-cw025_firmware
  • merkury_mi-cw024
  • merkury_mi-cw024_firmware
  • geeni_gnc-cw025
CWE
CWE-312

Cleartext Storage of Sensitive Information